CN106293962A - A kind of method and apparatus of calling system order - Google Patents
A kind of method and apparatus of calling system order Download PDFInfo
- Publication number
- CN106293962A CN106293962A CN201610620579.0A CN201610620579A CN106293962A CN 106293962 A CN106293962 A CN 106293962A CN 201610620579 A CN201610620579 A CN 201610620579A CN 106293962 A CN106293962 A CN 106293962A
- Authority
- CN
- China
- Prior art keywords
- application program
- request message
- service processes
- sent
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/544—Buffers; Shared memory; Pipes
Abstract
The present embodiments relate to field of computer technology, the method and apparatus particularly relating to a kind of application call system command, including: the first application program obtains the second application program and accesses the request message of system command, then request message is sent to be positioned at the service processes of system core layer by the first application program, performed system call by service processes, and according to the mark of the second application program, execution result is returned to the second application program by service processes.Can be seen that, after first application program obtains the request message that the second application program accesses system command, request message can be sent to be positioned at the service processes of system core layer, by service processes, execution result is returned to the second application program, thus realize the second application program indirect calling system order and obtain the result of calling system order, and then make the second application program simplerization realizing various functional requirement when.
Description
Technical field
The present embodiments relate to field of computer technology, the method and apparatus particularly relating to a kind of calling system order.
Background technology
Android (Android) system is in the consideration of security of system, enters the application program operated in android system
The fine granularity management of row authority and isolation, prevent generation and the abuse authority acquiring sensitive data of act in excess of authority, be i.e. normally applied
Program only has APP (application) authority, and the application of relatively core can have System (system) authority, has the application of APP authority
Program can only access file and the catalogue of oneself, it is impossible to accessing the data of system, the application program with System authority is permissible
Create and delete file, access equipment etc. in systems.And the system command in android system needs have root authority
Can perform, this results in Android application program and cannot use existing system command due to rights concerns base.
But, along with popularizing of Android intelligent terminal product, the function of Android application program is more and more abundanter,
The demand of application program is also got more and more by user, and realizing various functional requirement when, usually because of the problem of authority
Cause originally to become more to complicate by the function that existing system command realizes.
Summary of the invention
The embodiment of the present invention provides the method and apparatus of a kind of calling system order, in order to by application call system
Order, thus application program simplerization realizing various functional requirement when.
The embodiment of the present invention provides a kind of method of application call system command, including:
First application program obtains the second application program and accesses the request message of system command, carries in described request message
There are mark and the system call of the second application program of the second application program;
Described request message is sent to be positioned at the service processes of system core layer, described service by described first application program
Process performs described system call, and according to the mark of described second application program, execution result is returned to described second
Application program, described service processes is pre-set in system core layer.
The embodiment of the present invention also provides for the device of a kind of application call system command, including:
Acquisition module, accesses the request message of system command, takes in described request message for obtaining the second application program
Mark and the system call of the second application program with the second application program;
Processing module, for described request message is sent to be positioned at the service processes of system core layer, described service into
System call described in Cheng Zhihang, and according to the mark of described second application program, execution result is returned to described second should
By program, described service processes is pre-set in system core layer.
The method and apparatus of a kind of application call system command that above-described embodiment provides, including: first first should
Obtain the second application program by program and access the request message of system command, this request message carries the second application program
Mark and the system call of the second application program;Then request message is sent to be positioned at system core by the first application program
The service processes of central layer, is performed system call by service processes, and by service processes according to the mark of the second application program
Execution result returns to the second application program, and wherein, service processes is pre-set in system core layer.It can be seen that the
After one application program obtains the request message that the second application program accesses system command, can be sent to be positioned at system by request message
The service processes of core layer, is performed the system call of the second application program carried in request message by service processes, and
By service processes, execution result returned to the second application program, thus realize the indirect calling system order of the second application program also
Obtain the result of calling system order, and then make the second application program simpler realizing various functional requirement when
Change.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make
Accompanying drawing briefly introduce.
The method flow schematic diagram of a kind of application call system command that Fig. 1 provides for the embodiment of the present invention;
Fig. 2 applies journey by legitimate signature list to allow calling system order second for what the embodiment of the present invention provided
The checking schematic flow sheet of sequence;
The service processes that Fig. 3 provides for the embodiment of the present invention is illustrated based on flow process performed on the basis of communication link
Figure;
The structural representation of terminal W that Fig. 4 provides for the embodiment of the present invention;
Fig. 5 passes through the friendship between socket A and the service processes Y of binding for the application program X that the embodiment of the present invention provides
Schematic flow sheet mutually;
The apparatus structure schematic diagram of a kind of application call system command that Fig. 6 provides for the embodiment of the present invention.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and beneficial effect clearer, below in conjunction with accompanying drawing and enforcement
Example, is further elaborated to the present invention.Should be appreciated that specific embodiment described herein is only in order to explain this
Bright, it is not intended to limit the present invention.
It should be noted that the first application program in the embodiment of the present invention and the second application program differ, second
Application program can be any one application program in system, and the first application program then has acquisition the second application call
This call instruction is also sent to be positioned at the function of the service processes of system core layer by the call instruction of system command.
It should be noted that the method for the application call system command that the embodiment of the present invention provides is not limited in should
In Android system, the method for every application call system command using the embodiment of the present invention to provide in systems is equal
Belong to the scope that the embodiment of the present invention is protected.
Fig. 1 illustrates the method flow of a kind of application call system command that the embodiment of the present invention provides and shows
It is intended to, as it is shown in figure 1, this flow process comprises the steps that
S101, the first application program obtain the second application program and access the request message of system command, in this request message
Carry mark and the system call of the second application program of the second application program.
The request message that the second application program obtained accesses system command is sent to be positioned at by S102, the first application program
The service processes of system core layer, is performed described system call by this service processes, and should according to second by service processes
By the mark of program, execution result is returned to the second application program.
Wherein, service processes can be pre-set in system core layer.
Before above-mentioned steps S101, the various orders that the second application program is also accessed by the first application program are examined
Survey, when detecting that the second application program accesses system command failure, obtain mark and second application of the second application program
The system call of program.
For the safety of safeguards system, security mechanism can be set in systems, can be at systematic difference program frame
Prestore legitimate signature list in Ceng, and storage allows the second application program of calling system order in legitimate signature list
Signature value, to ensure that the second application program that only signature value is positioned in legitimate signature list just allows calling system order.
When system prestores above-mentioned legitimate signature list, and obtain the second application program access system at the first application program
After the request message of order, by the checking stream of the legitimate signature list the second application program to allowing calling system order
Journey, can be found in Fig. 2.
S201, the first application program obtain the second application program and access the request message of system command, in this request message
Carry mark and the system call of the second application program of the second application program.
S202, the first application program, according to the mark of the second application program carried in request message, obtain the second application
The signature value of program.
Concrete, the first application program can obtain the second application journey according to the access record of the second application program in system
The signature value of sequence, such as, obtains the MD5 value of the second application program, and by the MD5 value obtained and pre-stored in legitimate signature list
's
The legitimate signature list that S203, judgement prestore is whether to exist the signature value of the second application program, if depositing
, then go to step S204, otherwise terminate flow process.
Request message is sent to be positioned at the service processes of system core layer, by service processes by S204, the first application program
Perform described system call, and according to the mark of the second application program, execution result is returned to second by service processes should
Use program.
Preferably, also can pre-set socket (socket) in system Runtime Library layer, and the mark of socket is believed
Breath is bound with service processes and the first application program respectively, in order to set up leading between the first application program and service processes
Letter link.
On the basis of the communication link between the first application program and service processes, will request at the first application program
After message is sent to service processes, the flow process performed by service processes, can be found in Fig. 3.
S301, service processes, from receiving the request message that the first application program sends, carry second in this request message
The mark of application program and the system call of the second application program.
Concrete, service processes can wait asking of the first application program transmission to be received by monitoring the port of communication link
Seek message.
S302, service processes, according to the system call of the second application program carried in request message, perform described
System call, obtains and performs result, and in this execution result, portability has the mark of the second application program.
S303, service processes will be performed performing result by the communication link between the first application program and service processes
Result returns to the first application program.
First application program, can be according to perform to carry in result the after receiving the execution result that service processes returns
The mark of two application programs, is sent to the second application program by this execution result, indirectly calls realizing the second application program
System command.
Below by a specific example, above-mentioned method flow is carried out detailed explanation.
In this example embodiment, application program X, service processes Y, socket A are set in advance in the system of terminal W, and will clothes
Business process Y is arranged in the core layer of system, is arranged at by application program X in systematic difference process block rack-layer, by socket A
It is arranged in the Runtime Library layer of system, and the identification information of socket A is sent respectively to application program X and service processes Y.
Meanwhile, also in systematic difference process block rack-layer, it is previously stored with legitimate signature list 1, is stored in advance in system application
The content of the legitimate signature list 1 in ccf layer, can be found in form 1.
Form 1
Legitimate signature list |
XXX |
YYY |
…… |
Assume the systematic difference program layer of terminal W there is also application program B, application program C and application program D,
Then the structural representation of terminal W, can be found in Fig. 4.
It is further assumed that application program B's is designated 111, and assume that application program B needs when realizing certain function to hold
Row system call " ping 192.168.3.1 ", owing to system call ping 192.168.3.1 is system command,
And application program B does not have the authority performing system command, therefore application program B is performing system call ping
192.168.3.1 can return failed information time, such as, return failed information for " ping 192.168.3.1 is not internal
Or external command, it is not the program or autoexec that can run ".
When application program X detects that application program B performs system call " ping 192.168.3.1 " failure, should
By program X by the interaction flow between socket A and the service processes Y of binding, can be found in Fig. 5.
S501, application program X, when detecting that application program B accesses system command failure, obtain what application program B sent
Request message, carries the mark of application program B and the system command that application program B is to be accessed in this request message.
Wherein, when pre-setting application program X in systems, can the port numbers shared by application program X be sent to should
Use program B, to realize the communication between application program B and application program X.
S502, application program X are according to the mark 111 of application program B in request message, and inquiry application B is in systems
Access record, according to application program B access record in systems, obtain signature value XXX of application program B.
The legitimate signature that S503, application program X will pre-set in signature value XXX of the application program B of acquisition and system
The signature value prestored in list 1 is compared, owing to pre-setting 1 existence signature in legitimate signature list in systems
Value XXX, therefore the signature value of application program B is verified by application program X by legitimate signature list 1.
S504, after the signature value of application program B is verified by application program X by legitimate signature list 1, apply journey
Sequence X by the mark 111 of application program B and system call " ping 192.168.3.1 " by the socket bound in advance
A is sent to service processes Y.
S505, service processes Y call finger in the mark 111 and system receiving the application program B that application program X sends
After making " ping 192.168.3.1 ", execution system call " ping 192.168.3.1 ", the execution result of acquisition, can be such as
Shown in lower:
" just there are the data of 32 bytes at Ping 192.168.3.1:
Reply from 192.168.3.1: byte=32 time < 1ms TTL=64
192.168.3.1 Ping statistical information:
Packet: send=4, receives=4, loses=0<0% loss>
The estimation time<in units of millisecond>of round trip
The shortest=0ms, the longest=0ms, average=0ms.”
The mark 111 of application program B and the execution result of acquisition are passed through the set bound in advance by S506, service processes Y
Meet word A and be sent to application program X.
S507, application program X receive service processes Y send application program B mark 111 and perform result it
After, according to the mark of application program B, execution result is sent to application program B.
Application program B, after receiving the execution result that application program X sends, can realize certain function.
It should be noted that terminal W in the example above, may point to user and setting of voice and/or data connectivity is provided
Standby (device), including wireless terminal or catv terminal.Wireless terminal can be have wireless connecting function portable equipment,
Or it is connected to other processing equipments of radio modem, communicate through wireless access network and one or more core net
Mobile terminal.Such as, wireless terminal can be mobile phone (or being referred to as " honeycomb " phone) and the computer with mobile terminal.
And for example, wireless terminal can also be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device.
According to the above it can be seen that obtain the second application program at the first application program to access the request of system command
After message, request message can be sent to be positioned at the service processes of system core layer by the first application program, service processes perform
The system call of the second application program carried in request message, and by service processes, executions result is returned to second and answer
By program, thus realize the second application program indirect calling system order and obtain the result of calling system order, and then making
Second application program simplerization realizing various functional requirement when.Simultaneously as be provided with safe machine in systems
System, thus can also avoid risk, safeguards system safety.
Based on identical technology design, the embodiment of the present invention also provides for the device of a kind of application call system command,
As shown in Figure 6, this device comprises the steps that
Acquisition module 601, accesses the request message of system command, in described request message for obtaining the second application program
Carry mark and the system call of the second application program of the second application program;
Processing module 602, for being sent to be positioned at the service processes of system core layer, described service by described request message
Process performs described system call, and according to the mark of described second application program, execution result is returned to described second
Application program, described service processes is pre-set in system core layer.
It is also preferred that the left acquisition module 601, it is additionally operable to:
Before obtaining the request message of the second application program access system command, when described second application program being detected
When accessing system command failure, the system of the mark and described second application program that obtain described second application program calls finger
Order.
It is also preferred that the left
Acquisition module 601, is additionally operable to after obtaining the request message of the second application program access system command, according to institute
State the mark of the second application program carried in request message, obtain the signature value of described second application program;
Processing module 602, is additionally operable to the signature value judging whether there is described second application program in legitimate signature list,
If existing, then described request message is sent to described service processes;
Wherein, described legitimate signature list stores the signature value of the second application program allowing calling system order,
And described legitimate signature list is pre-stored within system application ccf layer.
It is also preferred that the left processing module 602, specifically for:
Described request message is sent in described first application program be positioned at by described first application program by socket
The service processes of system core layer, described socket is pre-set at system Runtime Library layer.
It is also preferred that the left processing module 602, specifically for:
The identification information of described socket is bound with described service processes and described first application program respectively, with
Set up described first application program and described service processes communication link;
Described execution result is sent to described first application program by described communication link by described service processes;
Described execution result is sent to described according to the mark of described second application program by described first application program
Two application programs.
It can be seen from the above: the request obtaining the second application program access system command at the first application program disappears
After breath, request message can be sent to be positioned at the service processes of system core layer by the first application program, service processes performing please
Seek the system call of the second application program carried in message, and by service processes, execution result is returned to the second application
Program, thus realize the second application program indirect calling system order and obtain the result of calling system order, and then make
Two application programs simplerization realizing various functional requirement when.Simultaneously as be provided with security mechanism in systems,
Thus can also avoid risk, safeguards system safety.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method or computer program.
Therefore, the embodiment in terms of the present invention can use complete hardware embodiment, complete software implementation or combine software and hardware
Form.And, the present invention can use can be with depositing at one or more computers wherein including computer usable program code
The shape of the upper computer program implemented of storage media (including but not limited to disk memory, CD-ROM, optical memory etc.)
Formula.
The present invention is with reference to method, equipment (system) and the flow process of computer program according to embodiments of the present invention
Figure and/or block diagram describe.It should be understood that can the most first-class by computer program instructions flowchart and/or block diagram
Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
Instruction arrives the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce
A raw machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for real
The device of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame now.
These computer program instructions may be alternatively stored in and computer or other programmable data processing device can be guided with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in this computer-readable memory produces and includes referring to
Make the manufacture of device, this command device realize at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or
The function specified in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that at meter
Perform sequence of operations step on calculation machine or other programmable devices to produce computer implemented process, thus at computer or
The instruction performed on other programmable devices provides for realizing at one flow process of flow chart or multiple flow process and/or block diagram one
The step of the function specified in individual square frame or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and amendment to these embodiments.So, claims are intended to be construed to include excellent
Select embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and the modification essence without deviating from the present invention to the present invention
God and scope.So, if these amendments of the present invention and modification belong to the scope of the claims in the present invention and equivalent technologies thereof
Within, then the present invention is also intended to comprise these change and modification.
Claims (10)
1. the method for an application call system command, it is characterised in that including:
First application program obtains the second application program and accesses the request message of system command, carries the in described request message
The mark of two application programs and the system call of the second application program;
Described request message is sent to be positioned at the service processes of system core layer, described service processes by described first application program
Perform described system call, and according to the mark of described second application program, execution result returned to described second application
Program, described service processes is pre-set in system core layer.
2. the method for claim 1, it is characterised in that obtain the second application program at described first application program and access
Before the request message of system command, also include:
Described first application program is when detecting that described second application program accesses system command failure, and obtaining described second should
With mark and the system call of described second application program of program.
3. the method for claim 1, it is characterised in that obtain the second application program at described first application program and access
After the request message of system command, also include:
Described first application program, according to the mark according to the second application program carried in described request message, obtains described
The signature value of two application programs;
Judge whether the legitimate signature list of described first application program exists the signature value of described second application program, if depositing
, described request message is sent to described service processes by described first application program;
Wherein, described legitimate signature list stores the signature value of the second application program allowing calling system order, and institute
State legitimate signature list to be pre-stored within system application ccf layer.
4. the method as described in claims 1 to 3 any one claim, it is characterised in that described first application program is by institute
State request message and be sent to described first application program is positioned at the service processes of system core layer, including:
Described request message is sent in described first application program be positioned at system by described first application program by socket
The service processes of core layer, described socket is pre-set at system Runtime Library layer.
5. method as claimed in claim 4, it is characterised in that described request message is passed through socket by described first application program
Word is sent to be positioned in described first application program the service processes of system core layer, including:
The identification information of described socket is bound with described service processes and described first application program respectively, to set up
Described first application program and described service processes communication link;
Execution result is returned to described second application program by the described mark according to described second application program, including:
Described execution result is sent to described first application program by described communication link by described service processes;
Described execution result is sent to described second according to the mark of described second application program by described first application program should
Use program.
6. the device of an application call system command, it is characterised in that including:
Acquisition module, accesses the request message of system command, carries in described request message for obtaining the second application program
The mark of the second application program and the system call of the second application program;
Processing module, for being sent to be positioned at the service processes of system core layer by described request message, described service processes is held
The described system call of row, and according to the mark of described second application program, executions result is returned to described second and apply journey
Sequence, described service processes is pre-set in system core layer.
7. device as claimed in claim 6, it is characterised in that described acquisition module, is additionally operable to:
Before obtaining the request message of the second application program access system command, when detecting that described second application program accesses
During system command failure, obtain mark and the system call of described second application program of described second application program.
8. device as claimed in claim 6, it is characterised in that
Described acquisition module, is additionally operable to after obtaining the request message of the second application program access system command, according to described
The mark of the second application program carried in request message, obtains the signature value of described second application program;
Described processing module, is additionally operable to the signature value judging whether there is described second application program in legitimate signature list, if
Exist, then described request message is sent to described service processes;
Wherein, described legitimate signature list stores the signature value of the second application program allowing calling system order, and institute
State legitimate signature list to be pre-stored within system application ccf layer.
9. the device as described in claim 6~8 any one claim, it is characterised in that described processing module, specifically uses
In:
Described request message is sent in described first application program be positioned at system by described first application program by socket
The service processes of core layer, described socket is pre-set at system Runtime Library layer.
10. device as claimed in claim 9, it is characterised in that described processing module, specifically for:
The identification information of described socket is bound with described service processes and described first application program respectively, to set up
Described first application program and described service processes communication link;
Described execution result is sent to described first application program by described communication link by described service processes;
Described execution result is sent to described second according to the mark of described second application program by described first application program should
Use program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610620579.0A CN106293962B (en) | 2016-08-01 | 2016-08-01 | Method and device for calling system command |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610620579.0A CN106293962B (en) | 2016-08-01 | 2016-08-01 | Method and device for calling system command |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106293962A true CN106293962A (en) | 2017-01-04 |
CN106293962B CN106293962B (en) | 2019-12-20 |
Family
ID=57663773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610620579.0A Active CN106293962B (en) | 2016-08-01 | 2016-08-01 | Method and device for calling system command |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106293962B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107068150A (en) * | 2017-05-03 | 2017-08-18 | 安利军 | A kind of Android intelligent sounds control method and system |
CN107145390A (en) * | 2017-04-10 | 2017-09-08 | 北京智能管家科技有限公司 | Android service lifecycle management method, service management object and Android system |
CN113326067A (en) * | 2021-05-11 | 2021-08-31 | 深圳市捷视飞通科技股份有限公司 | Command execution method, system, computer device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034811A (en) * | 2011-09-29 | 2013-04-10 | 北大方正集团有限公司 | File processing method and system and device |
CN103514395A (en) * | 2012-06-20 | 2014-01-15 | 阿里巴巴集团控股有限公司 | Plug-in right control method and system |
-
2016
- 2016-08-01 CN CN201610620579.0A patent/CN106293962B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034811A (en) * | 2011-09-29 | 2013-04-10 | 北大方正集团有限公司 | File processing method and system and device |
CN103514395A (en) * | 2012-06-20 | 2014-01-15 | 阿里巴巴集团控股有限公司 | Plug-in right control method and system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145390A (en) * | 2017-04-10 | 2017-09-08 | 北京智能管家科技有限公司 | Android service lifecycle management method, service management object and Android system |
CN107145390B (en) * | 2017-04-10 | 2019-11-19 | 北京儒博科技有限公司 | Android service lifecycle management method, service management object-based device and Android system |
CN107068150A (en) * | 2017-05-03 | 2017-08-18 | 安利军 | A kind of Android intelligent sounds control method and system |
CN113326067A (en) * | 2021-05-11 | 2021-08-31 | 深圳市捷视飞通科技股份有限公司 | Command execution method, system, computer device and storage medium |
CN113326067B (en) * | 2021-05-11 | 2024-02-06 | 深圳市捷视飞通科技股份有限公司 | Command execution method, system, computer device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106293962B (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1852094B (en) | Method and system for protecting account of network business user | |
CN104767713B (en) | Account binding method, server and system | |
CN108009825A (en) | A kind of identity management system and method based on block chain technology | |
CN104378342A (en) | Multi-account verification method, device and system | |
CN108512870A (en) | Access method, platform of internet of things and the internet of things equipment of platform of internet of things | |
CN106878250B (en) | Cross-application single-state login method and device | |
CN104917749A (en) | Account registration method and device | |
CN104753677A (en) | Password hierarchical control method and system | |
CN111176794A (en) | Container management method and device and readable storage medium | |
CN107888589A (en) | A kind of method and its system for calling trusted application | |
CN105933374A (en) | Mobile terminal data backup method, system and mobile terminal | |
CN106293962A (en) | A kind of method and apparatus of calling system order | |
CN103716400A (en) | Method and system for achieving mobile working based on virtual machine | |
CN102801728B (en) | The management method of automatic login of client side and system | |
CN105743651A (en) | Method and apparatus for utilizing card application in chip security domain, and application terminal | |
CN105577621B (en) | Business operation verification method, device and system | |
US20150154510A1 (en) | Electronic device | |
CN116318911A (en) | Domain name access method and device, electronic equipment and storage medium | |
US8707330B2 (en) | Method and system for controlled communication between applications | |
CN112543194B (en) | Mobile terminal login method and device, computer equipment and storage medium | |
CN109743237B (en) | Authentication method of APP and gateway | |
JP2023521901A (en) | Mobile application forgery/falsification detection method, computer program, computer-readable recording medium and computer device using user identifier and signature collection | |
CN115941217A (en) | Method for secure communication and related product | |
CN112637167A (en) | System login method and device, computer equipment and storage medium | |
CN106557372B (en) | Application sharing method and device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |